Although Israel's national security strategy, shaped by Ben Gurion in the 1950s, has remained steadfast, Israeli leaders have been keen to adapt and change some of its means and tools to maintain its national security. These changes were a response and adaptation to the complex and geostrategic transformations in the region since the end of the cold war. Traditional challenges to Israel's national security have declined as unconventional challenges have increased. This shift has adversely affected the efficiency and effectiveness of Israel's national security strategies. It has become necessary for Israel to confront regional actions taken by minor states and regional actors that have ensured the accumulation of its military capabilities. Meanwhile, sociopolitical values in Israeli society have undergone several changes since 2011, not to mention the continuing conflict with the Palestinians. This study, therefore, aims to elaborate on the concept of national security, differentiate national security from similar concepts, and identify the threats to Israel's national security, represented by challenges arising from actions without states in the Syrian border areas, namely Quneitra, Suwayda and Daraa. Also, this study demystifies the aspects of Israel's strategies to address these challenges after 2011. Thus, this study draws on three key border cities, Quneitra, Swayda, and Daraa, which are vital parts of Syria.
The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show Moreلقد مثلت عملية التحول من النظام الشمولي الى مشروع اقامة نظام جديد ومغاير نقلة نوعية شهده المجتمع العراقي بعد 9/4/ 2003 القت بظلالها على مختلف الاصعدة السياسية والاقتصادية والاجتماعية، ولعل من بين ابرز تلك التحولات ذلك الذي تبلور على حول مفهوم الهوية الوطنية واعادة تشكيلها من خلال صياغة جديدة لمفهوم المواطنة الذي يفترض ان تكون القاعدة الراسخة التي يتأسس عليها المشروع الوطني الجديد الرامي الى إقامة او إعادة تأسي
... Show Moreلقد مثلت عملية التحول من النظام الشمولي الى مشروع اقامة نظام جديد ومغاير نقلة نوعية شهده المجتمع العراقي بعد 9/4/ 2003 القت بظلالها على مختلف الاصعدة السياسية والاقتصادية والاجتماعية، ولعل من بين ابرز تلك التحولات ذلك الذي تبلور على حول مفهوم الهوية الوطنية واعادة تشكيلها من خلال صياغة جديدة لمفهوم المواطنة الذي يفترض ان تكون القاعدة الراسخة التي يتأسس عليها المشروع الوطني الجديد الرامي الى إقامة او إعادة تأسي
... Show MoreThis paper is concerned with the blow-up solutions of a system of two reaction-diffusion equations coupled in both equations and boundary conditions. In order to understand how the reaction terms and the boundary terms affect the blow-up properties, the lower and upper blow-up rate estimates are derived. Moreover, the blow-up set under some restricted assumptions is studied.
The excessive and rapid urban growth witnessed by most cities in the world can be a cause of diseases and epidemics, especially those problems related to population, which include problems of transportation and increase in density in the centers, in addition to the lack of interest in planning and designing those cities to take into account the health aspect of the city and obtain The health well-being of the population, and each of these problems has negative effects on health in general and on human health in particular through its prevalence. Therefore, many concepts that serve as a tool for achieving public health and the physical health of the population have emerged, including the concept of city health, which is defined as cities
... Show MoreBackground: The strategy for eliminating measles from Iraq includes conducting mass immunization campaign against measles, within the framework of the national strategic plan for the elimination of this disease. Awareness about this campaign is fundamental for their success.Objective: The study aims at finding out the knowledge, attitudes and practices regarding vaccination against measles among two groups of students in two different colleges ( medical and engineering) .To report uptake of Measles vaccine and reasons for declining the vaccine among medical and non-medical students in the campaignMethod: Across sectional study has been conducted at Al-Kindy College of Medicine/ Baghdad University and University of Technology for the peri
... Show MoreTechnological and digital development has allowed the emergence of many methods of producing semantics on social media sites within semiotic and propagandistic frameworks. This is what made the image appear in different molds and shapes, especially as it is the first material for visual perception.
This made the Israeli propaganda discourse use it as an important tool to manage the content of suggestive messages with semiological connotations. By doing so, such tool uses social networking sites as an appropriate environment to achieve those goals, which are related to cases of manipulating emotions and minds. It, moreover, changes convictions, attitudes, trends and behaviors according to what the propaganda planner wants.
Many Isra
The concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current
... Show More